What happens next?
a company laptop was stolen from an employee’s car or at an airport?
your customer data or accounting files got corrupted and were not recoverable?
an employee checked their personal email at work and innocently clicked on a link that encrypted your entire network and demanded a ransom?